CYBER SECURITY (ENGLISH, THESIS) | |||||
Master | TR-NQF-HE: Level 7 | QF-EHEA: Second Cycle | EQF-LLL: Level 7 |
Course Code | Course Name | Semester | Theoretical | Practical | Credit | ECTS |
CYS5888-1 | Master Thesis | Fall | 0 | 0 | 0 | 20 |
Language of instruction: | English |
Type of course: | Must Course |
Course Level: | |
Mode of Delivery: | |
Course Coordinator : | Assist. Prof. AHMET NACİ ÜNAL |
Recommended Optional Program Components: | None |
Course Objectives: | Within the scope of this course, it is planned to make literature review for the research subject, and by considering the literature review, analysis and design steps for the project will performed. |
The students who have succeeded in this course; The students who have succeeded in this course; 1. Defining problem for scientific work. 2. Identifying and describing literature review for scientific work preparation. 3. Analyzing literature for identifying possible research possibilities. 4. Identifying requirements for the scientific work. 5. Analyzing methodologies for the research topic. 6. Designing problem solution by using the methodologies. |
This course includes the definition of problems, various source scans about the selected topic, article analysis and methodology, analysis and evaluation of collected data, and reporting. |
Week | Subject | Related Preparation |
1) | Problem definition | Lecturer notes |
2) | Problem definition | Lecturer notes |
3) | Literature review about problem definition | Internet, library |
4) | Literature review about problem definition | Internet, library |
5) | Literature review about problem definition | Internet, library |
6) | Literature review about problem definition | Internet, library |
7) | Analyzing existing studies | None |
8) | Analyzing existing studies | None |
9) | Requirement analysis for the defined problem | None |
10) | Requirement analysis for the defined problem | None |
11) | Requirement analysis for the defined problem | None |
12) | Requirement analysis for the defined problem | None |
13) | Designing solution for the defined problem | None |
14) | Designing solution for the defined problem | None |
Course Notes / Textbooks: | Internet, kütüphane |
References: | Internet, library |
Semester Requirements | Number of Activities | Level of Contribution |
Presentation | 4 | % 50 |
Project | 1 | % 50 |
Total | % 100 | |
PERCENTAGE OF SEMESTER WORK | % 50 | |
PERCENTAGE OF FINAL WORK | % 50 | |
Total | % 100 |
Activities | Number of Activities | Duration (Hours) | Workload |
Course Hours | 15 | 15 | 225 |
Study Hours Out of Class | 15 | 15 | 225 |
Presentations / Seminar | 15 | 10 | 150 |
Project | 15 | 10 | 150 |
Total Workload | 750 |
No Effect | 1 Lowest | 2 Low | 3 Average | 4 High | 5 Highest |
Program Outcomes | Level of Contribution | |
1) | Understand and implement advanced concepts of Siber Security | 5 |
2) | Use math, science, and modern engineering tools to formulate and solve advenced siber security problems. | 5 |
3) | Review the literature critically pertaining to his/her research projects, and connect the earlier literature to his/her own results | 4 |
4) | Follow, interpret and analyze scientific researches in the field of engineering and use the knowledge in his/her field of study | 4 |
5) | Work effectively in multi-disciplinary research teams | 5 |
6) | Acquire scientific knowledge | 5 |
7) | Find out new methods to improve his/her knowledge. | 4 |
8) | Effectively express his/her research ideas and findings both orally and in writing | 4 |
9) | Defend research outcomes at seminars and conferences. | 5 |
10) | Prepare master thesis and articles about thesis subject clearly on the basis of published documents, thesis, etc. | 5 |
11) | Demonstrate professional and ethical responsibility. | 5 |